Correction: Fog computing network security based on resources management.
Wided Ben DaoudSalwa OthmenMonia HamdiRadhia KhdhirHabib HamamPublished in: EURASIP J. Wirel. Commun. Netw. (2023)
Keyphrases
- network security
- intrusion detection
- computer networks
- digital economy
- network monitoring
- traffic analysis
- security policies
- intrusion detection system
- information security
- risk assessment
- network traffic
- dos attacks
- ip networks
- network access
- anomaly detection
- network management
- decision support
- data processing
- situation assessment
- knowledge management
- network administrators
- security protection
- network intrusion
- decision making
- security breaches
- anti phishing
- business intelligence
- data management
- information systems
- data transfer
- smart card
- denial of service
- dimensionality reduction
- active learning
- data analysis
- machine learning
- real world
- databases